Author of the publication

A Generalized Birthday Attack.

, , and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 129-156. Springer, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Server-Aided Verification: Theory and Practice., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 605-623. Springer, (2005)On the Length of Cryptographic Hash-Values Used in Identification Schemes., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 202-215. Springer, (1994)On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order., , and . J. Cryptol., 19 (4): 463-487 (2006)How to Guess l-th Roots Modulo n by Reducing Lattice Bases., , and . AAECC, volume 357 of Lecture Notes in Computer Science, page 427-442. Springer, (1988)A Generalized Birthday Attack., , and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 129-156. Springer, (1988)Low-Cost Cryptography for Privacy in RFID Systems., , , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 237-251. Springer, (2006)Minimum-change binary block-codes which are well balanced., , and . EUROCODE, volume 514 of Lecture Notes in Computer Science, page 76-86. Springer, (1990)An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number.. EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 481-486. Springer, (1990)Computation of Approximate L-th Roots Modulo n and Application to Cryptography., , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 100-117. Springer, (1988)A (non-practical) three-pass identification protocol using coding theory.. AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 265-272. Springer, (1990)